If the past is any predictor of the future, we can expect a dramatic surge of malware infections during the next several weeks. Historically, the number of malware infections has increased significantly during November and December. This annual spike is primarily driven...

Most malware detection systems identify malicious code by monitoring its execution in a sandbox environment to detect anomalous behavior. As the malware runs, the sandbox searches for signs of odd or unauthorized actions like:
Elevating privileges to "administrator" or "root" when the program doesn't ordinarily...

Only those malware detection systems that can view and analyze each instruction as the malware executes within the CPU can effectively detect Return-Oriented Programming-based threats. Today's advanced malware continues to enhance the technologies it uses to avoid being detected. One of...

Advanced malware solutions ("sandboxes") traditionally use virtual machines (VM) to analyze suspicious objects to find out if they are malicious. However, advanced malware is capable of detecting the presence of the virtual machine technology used by conventional sandboxes and leveraging this weakness to...

The latest firewalls, IPS, and first-generation sandbox appliances are no match for today's sophisticated and evasive malware. When explaining what Lastline does, occasionally I hear a comment along these lines: "Well, we have a next-generation firewall and it has malware detection...

The average U.S. corporation spends $15 million a year on security products and services to battle cybercrime, yet malware infections and data breaches are still occurring at an unprecedented rate. We've all seen the constant drumbeat of data breach headlines. This...